International Journal of Communications, Network and System Sciences

Volume 4, Issue 4 (April 2011)

ISSN Print: 1913-3715   ISSN Online: 1913-3723

Google-based Impact Factor: 1.39  Citations  

Cubic Root Extractors of Gaussian Integers and Their Application in Fast Encryption for Time-Constrained Secure Communication

HTML  Download Download as PDF (Size: 202KB)  PP. 197-204  
DOI: 10.4236/ijcns.2011.44024    5,706 Downloads   9,943 Views  Citations
Author(s)

Affiliation(s)

.

ABSTRACT

There are settings where encryption must be performed by a sender under a time constraint. This paper de-scribes an encryption/decryption algorithm based on modular arithmetic of complex integers called Gaus-sians. It is shown how cubic extractors operate and how to find all cubic roots of the Gaussian. All validations (proofs) are provided in the Appendix. Detailed numeric illustrations explain how to use the method of digital isotopes to avoid ambiguity in recovery of the original plaintext by the receiver.

Share and Cite:

B. Verkhovsky, "Cubic Root Extractors of Gaussian Integers and Their Application in Fast Encryption for Time-Constrained Secure Communication," International Journal of Communications, Network and System Sciences, Vol. 4 No. 4, 2011, pp. 197-204. doi: 10.4236/ijcns.2011.44024.

Cited by

[1] Modification of Traditional RSA into Symmetric-RSA Cryptosystems
International Journal of Business Data Communications and Networking (IJBDCN), 2017
[2] A novice cryptosystem based on n th root of Gaussian integers
2017
[3] A novice cryptosystem based on nth root of Gaussian integers
2017
[4] SwiftEnc: Hybrid Cryptosystem with Hash-Based Dynamic Key Encryption
2015
[5] Integer Algorithms in Cryptology and Information Assurance
World Scientific Publishing, 2015
[6] A Modified Variant of RSA Algorithm for Gaussian Integers
Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012, 2014
[7] The Quartic Public Key Transformation
arXiv preprint arXiv:1304.4273, 2013
[8] Generalized Public Key Transformations with Side Information
arXiv preprint arXiv:1304.4651, 2013
[9] Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls
Int'l J. of Communications, Network and System Sciences, 2011
[10] Protection of Sensitive Messages Based on Quadratic Roots of Gaussians: Groups with Complex Modulus
Int'l J. of Communications, Network and System Sciences, 2011
[11] Information Protection Based on Extraction of Square Roots of Gaussian Integers
Int'l J. of Communications, Network and System Sciences, 2011
[12] Information Protection Based on Extraction of Square Roots of Gaussian Integers.
2011

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.